{"id":"https://openalex.org/W3092055797","doi":"https://doi.org/10.1145/3320269.3409495","title":"Proofs or Remote Execution and Mitigation of TOCTOU Attacks","display_name":"Proofs or Remote Execution and Mitigation of TOCTOU Attacks","publication_year":2020,"publication_date":"2020-10-05","ids":{"openalex":"https://openalex.org/W3092055797","doi":"https://doi.org/10.1145/3320269.3409495","mag":"3092055797"},"language":"en","primary_location":{"id":"doi:10.1145/3320269.3409495","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3409495","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009882362","display_name":"Gene Tsudik","orcid":"https://orcid.org/0000-0002-8467-8614"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Gene Tsudik","raw_affiliation_strings":["University of California, Irvine, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5009882362"],"corresponding_institution_ids":["https://openalex.org/I204250578"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12302056,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9735000133514404,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13248","display_name":"Healthcare Technology and Patient Monitoring","score":0.9663000106811523,"subfield":{"id":"https://openalex.org/subfields/2746","display_name":"Surgery"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7856481075286865},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.6398634910583496},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6193986535072327},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5872005224227905},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5576215982437134},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5351610779762268},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4969618618488312},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.49131765961647034},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.48749375343322754},{"id":"https://openalex.org/keywords/embedded-software","display_name":"Embedded software","score":0.4123591482639313},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19703570008277893}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7856481075286865},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.6398634910583496},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6193986535072327},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5872005224227905},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5576215982437134},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5351610779762268},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4969618618488312},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.49131765961647034},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.48749375343322754},{"id":"https://openalex.org/C154488198","wikidata":"https://www.wikidata.org/wiki/Q1335007","display_name":"Embedded software","level":3,"score":0.4123591482639313},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19703570008277893},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3320269.3409495","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3409495","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3116385918","display_name":null,"funder_award_id":"W911NF-16-1-0536","funder_id":"https://openalex.org/F4320338320","funder_display_name":"U.S. Army Aeromedical Research Laboratory"},{"id":"https://openalex.org/G4013892920","display_name":null,"funder_award_id":"2019-TS-2907","funder_id":"https://openalex.org/F4320306087","funder_display_name":"Semiconductor Research Corporation"}],"funders":[{"id":"https://openalex.org/F4320306087","display_name":"Semiconductor Research Corporation","ror":"https://ror.org/047z4n946"},{"id":"https://openalex.org/F4320338320","display_name":"U.S. Army Aeromedical Research Laboratory","ror":"https://ror.org/01ajqvg59"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W4394650907","https://openalex.org/W154364797","https://openalex.org/W4254119641","https://openalex.org/W3196207352","https://openalex.org/W2951724202","https://openalex.org/W3084261076","https://openalex.org/W2576399385","https://openalex.org/W2963408011","https://openalex.org/W4236324517","https://openalex.org/W1586813864"],"abstract_inverted_index":{"PART":[0,211],"I:":[1],"Modern":[2],"society":[3],"is":[4,197,293,354,439,445],"increasingly":[5,187],"surrounded":[6],"by,":[7],"and":[8,20,36,43,123,182,200,232,252,275,335,360,427,433,444,451,462],"relies":[9],"upon,":[10],"a":[11,96,174,259,329,383,448],"wide":[12],"range":[13,175],"of":[14,68,112,144,158,163,176,192,222,242,268,316,366,372,470],"Cyber-Physical":[15],"Systems":[16],"(CPS),":[17],"Internet-of-Things":[18],"(IoT),":[19],"smart":[21],"devices.":[22,210,226,420],"They":[23,48],"often":[24],"perform":[25],"safety-critical":[26,81,193],"functions":[27],"in":[28,80,189,356,363,423,464],"numerous":[29],"settings,":[30],"e.g.,":[31],"home,":[32],"office,":[33],"medical,":[34],"automotive":[35],"industrial.":[37],"Some":[38],"devices":[39,63,431],"are":[40,64,186],"small,":[41],"cheap":[42],"specialized":[44],"sensors":[45],"and/or":[46],"actuators.":[47],"tend":[49],"to":[50,91,103,120,179,218,387,441],"have":[51,235],"meager":[52],"resources,":[53],"run":[54],"simple":[55,97],"software,":[56],"sometimes":[57],"upon":[58],"bare":[59],"metal.":[60],"If":[61],"such":[62,265],"left":[65],"unprotected,":[66],"consequences":[67],"forged":[69],"sensor":[70],"readings":[71],"or":[72,138,307],"ignored":[73],"actuation":[74],"commands":[75],"can":[76],"be":[77,136,320,346,442],"catastrophic,":[78],"particularly,":[79],"settings.":[82],"This":[83,171,312,348],"prompts":[84],"the":[85,126,132,141,145,161,190,239,283,288,300,338,357,364,369,389,402],"following":[86],"three":[87],"questions:":[88],"(1)":[89,122],"How":[90,102],"trust":[92],"data":[93,107],"produced":[94,109],"by":[95,151,447],"remote":[98,133,223,284],"embedded":[99,169,209,224,419],"device?":[100],"(2)":[101,124],"ascertain":[104],"that":[105,128,314,398],"this":[106,373],"was":[108],"via":[110],"execution":[111,306],"expected":[113],"software?":[114],"And,":[115],"(3)":[116],"Is":[117],"it":[118,201],"possible":[119],"attain":[121],"under":[125,238],"assumption":[127],"all":[129],"software":[130,220,249,273],"on":[131],"device":[134],"could":[135],"modified":[137],"compromised?":[139],"In":[140,322,368],"first":[142,162],"part":[143,371],"talk":[146],"we":[147,375],"answer":[148],"these":[149],"questions":[150],"describing":[152],"VAPE:":[153],"Verified":[154],"Architecture":[155],"for":[156,167,207,261,430],"Proofs":[157],"Execution":[159],"[1],":[160],"its":[164,332,341,408],"kind":[165],"result":[166],"low-end":[168,418],"systems.":[170,194],"work":[172],"has":[173,215],"applications,":[177],"especially,":[178],"authenticated":[180],"sensing":[181],"trustworthy":[183],"actuation,":[184],"which":[185],"relevant":[188],"context":[191,365],"VAPE":[195],"architecture":[196],"publicly":[198,449],"available":[199,450],"incurs":[202],"low":[203,459],"overhead,":[204,461],"affordable":[205],"even":[206,396],"lowest-end":[208],"II:":[212],"Much":[213],"attention":[214],"been":[216,236],"devoted":[217],"verifying":[219],"integrity":[221,250],"(IoT)":[225],"Many":[227],"techniques,":[228],"with":[229,379,432],"different":[230],"assumptions":[231],"security":[233,263],"guarantees,":[234],"proposed":[237],"common":[240],"umbrella":[241],"so-called":[243],"Remote":[244,377],"Attestation":[245,378],"(RA).":[246],"Aside":[247],"from":[248],"verification":[251],"malware":[253,318,327,397],"presence":[254,315,343],"detection,":[255],"RA":[256,280,291,305,310,390,404,414,471],"serves":[257],"as":[258,266],"foundation":[260],"many":[262],"services,":[264],"proofs":[267],"memory":[269],"erasure,":[270],"system":[271],"reset,":[272],"update,":[274],"runtime":[276],"verification.":[277],"All":[278],"prior":[279],"techniques":[281,456],"verify":[282],"device's":[285,301],"state":[286,302],"at":[287,417],"time":[289],"when":[290],"functionality":[292],"executed,":[294],"thus":[295],"providing":[296],"no":[297],"information":[298],"about":[299],"before":[303,337,401],"current":[304],"between":[308],"consecutive":[309],"executions.":[311],"implies":[313],"transient":[317,326],"may":[319],"undetected.":[321],"other":[323],"words,":[324],"if":[325],"infects":[328],"device,":[330],"performs":[331],"nefarious":[333],"tasks,":[334],"leaves":[336],"next":[339,403],"attestation,":[340],"temporary":[342],"will":[344],"not":[345],"detected.":[347],"important":[349],"problem,":[350],"called":[351],"Time-Of-Check-Time-Of-Use":[352],"(TOCTOU),":[353],"well-known":[355],"research":[358],"literature":[359],"remains":[361],"unaddressed":[362],"RA.":[367],"second":[370],"talk,":[374],"discuss":[376],"TOCTOU":[380,391],"Avoidance":[381],"(RATA):":[382],"provably":[384],"secure":[385,443],"approach":[386],"address":[388],"problem":[392],"[2].":[393],"With":[394],"RATA,":[395],"erases":[399],"itself":[400],"execution,":[405],"cannot":[406],"hide":[407],"ephemeral":[409],"presence.":[410],"RATA":[411],"targets":[412],"hybrid":[413],"architectures":[415],"aimed":[416],"It":[421],"comes":[422],"two":[424],"version:":[425],"RATA-A":[426],"RATA-B,":[428],"suitable":[429],"without":[434],"real-time":[435],"clocks,":[436],"respectively.":[437],"Each":[438],"shown":[440],"accompanied":[446],"formally":[452],"verified":[453],"implementation.":[454],"Both":[455],"incur":[457],"rather":[458],"hardware":[460],"it,":[463],"fact,":[465],"substantially":[466],"reduces":[467],"computational":[468],"costs":[469],"execution.":[472]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
